File name:

audit1file.ex_

Full analysis: https://app.any.run/tasks/dfaf6bd9-205f-455e-b329-940c8abd005d
Verdict: Malicious activity
Analysis date: May 15, 2025, 11:09:38
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

B87282457D70A04A939D85BC0D010307

SHA1:

F66E7F5A0600D008E918A2033CB8B2EC65A04A06

SHA256:

82CB3541248E67AC23B05AA6451BE8C0A3AD2150741C680F1ED1A92AE4E062F2

SSDEEP:

98304:xqfxOxmPbg9+d/FS9WSTWA34n3tKwEApJM6Gmkuhy3nU8qkSyfvt4Qne88+VQ5TB:yIyWtJa11QZnvJG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts another process probably with elevated privileges via RUNAS.EXE

      • runas.exe (PID: 6268)
    • Process drops legitimate windows executable

      • audit1file.ex_.exe (PID: 4892)
      • audit1file.ex_.exe (PID: 4108)
    • The process drops C-runtime libraries

      • audit1file.ex_.exe (PID: 4892)
      • audit1file.ex_.exe (PID: 4108)
    • Process drops python dynamic module

      • audit1file.ex_.exe (PID: 4892)
      • audit1file.ex_.exe (PID: 4108)
    • Executable content was dropped or overwritten

      • audit1file.ex_.exe (PID: 4892)
      • audit1file.ex_.exe (PID: 4108)
    • Loads Python modules

      • audit1file.ex_.exe (PID: 2568)
      • audit1file.ex_.exe (PID: 6080)
    • There is functionality for taking screenshot (YARA)

      • audit1file.ex_.exe (PID: 4892)
    • Application launched itself

      • audit1file.ex_.exe (PID: 4892)
      • audit1file.ex_.exe (PID: 4108)
  • INFO

    • The sample compiled with english language support

      • audit1file.ex_.exe (PID: 4892)
      • audit1file.ex_.exe (PID: 4108)
    • Reads the computer name

      • audit1file.ex_.exe (PID: 4892)
      • audit1file.ex_.exe (PID: 2568)
      • audit1file.ex_.exe (PID: 4108)
      • audit1file.ex_.exe (PID: 6080)
    • Checks supported languages

      • audit1file.ex_.exe (PID: 4892)
      • audit1file.ex_.exe (PID: 2568)
      • audit1file.ex_.exe (PID: 4108)
      • audit1file.ex_.exe (PID: 6080)
    • Reads the machine GUID from the registry

      • audit1file.ex_.exe (PID: 2568)
      • audit1file.ex_.exe (PID: 6080)
    • PyInstaller has been detected (YARA)

      • audit1file.ex_.exe (PID: 4892)
    • Manual execution by a user

      • audit1file.ex_.exe (PID: 4108)
    • Create files in a temporary directory

      • audit1file.ex_.exe (PID: 4108)
      • audit1file.ex_.exe (PID: 6080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (50.1)
.exe | Win64 Executable (generic) (32.2)
.dll | Win32 Dynamic Link Library (generic) (7.6)
.exe | Win32 Executable (generic) (5.2)
.exe | Generic Win/DOS Executable (2.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:18 09:52:16+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.36
CodeSize: 151552
InitializedDataSize: 104960
UninitializedDataSize: -
EntryPoint: 0xa510
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
9
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start runas.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs audit1file.ex_.exe rundll32.exe no specs audit1file.ex_.exe audit1file.ex_.exe no specs audit1file.ex_.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1676"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2568C:\Users\admin\audit1file.ex_.exeC:\Users\admin\audit1file.ex_.exeaudit1file.ex_.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\audit1file.ex_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
4108"C:\Users\admin\audit1file.ex_.exe" C:\Users\admin\audit1file.ex_.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\audit1file.ex_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4892C:\Users\admin\audit1file.ex_.exeC:\Users\admin\audit1file.ex_.exe
runas.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\audit1file.ex_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
5352C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6080"C:\Users\admin\audit1file.ex_.exe" C:\Users\admin\audit1file.ex_.exeaudit1file.ex_.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\audit1file.ex_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6268"C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\audit1file.ex_.exeC:\Windows\System32\runas.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\runas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6640C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6808\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerunas.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
3 146
Read events
3 146
Write events
0
Delete events
0

Modification events

No data
Executable files
56
Suspicious files
11
Text files
1 837
Unknown types
0

Dropped files

PID
Process
Filename
Type
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\VCRUNTIME140.dllexecutable
MD5:AE96651CFBD18991D186A029CBECB30C
SHA256:1B372F064EACB455A0351863706E6326CA31B08E779A70DE5DE986B5BE8069A1
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\_socket.pydexecutable
MD5:51A38A6BF4C7E3D71B21A88B7A1DD555
SHA256:B7829EC5C6DE17B30037E1B50F43E26B40FCD9ACDABCE0011D623F5C0CEBD70E
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\_ssl.pydexecutable
MD5:E577403078DAF63CE6DDC07F195C45CE
SHA256:49559F96F659917C1C0E0D7CCB4FCF915BC1A00E51A5B25FE417262EF0F47774
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\_tkinter.pydexecutable
MD5:CA14F8ECEC66E86D206656CCDB7E9E50
SHA256:2AD4C0A6E125862880C5359FEE1F64DEAAB706498F92107C0F8F03654D8EC54C
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\pyexpat.pydexecutable
MD5:EA5E7E997193098C2259119A37C7E4C4
SHA256:40B17F3DFF41E29492C8519372D435CD973F0A67597663FB12AD6756EAAA9077
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\_contextvars.pydexecutable
MD5:4A525F91513ECE5FE180A5D1123D8337
SHA256:6629835406814CD78D006A6080EFAF0E93E28B88B3FA2FEB00B7EF9C975E4A61
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\_bz2.pydexecutable
MD5:055CFC5297933C338D8C04FD4E2462A2
SHA256:BEFC81440BBC001BD7647ACA42962EE0B45B08435EE9F7140BF570AF636B7DD5
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\Pythonwin\win32ui.pydexecutable
MD5:7D87B6F032AF0AA468274CA33556AA5C
SHA256:5A68FE8E5CF84A2BD9EA9523643CC7A124E035EF8CEAAC4675F95B7A34294E2A
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\_elementtree.pydexecutable
MD5:AF1CE090BCC447C42EEAB4651DD2F2E0
SHA256:1E57D69385E2889EE3532F692FA8F1D2393C0FB4EF2E1D05745BF0CA4241318D
4892audit1file.ex_.exeC:\Users\Administrator\AppData\Local\Temp\_MEI48922\Pythonwin\mfc140u.dllexecutable
MD5:3F9AC13ECAE3EE6D409CEA2501E63892
SHA256:18E06B78A57952C5C3FFCCD8191B6047B5EA222DEE1E7728B72B280B54E0FB7E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7156
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7156
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7156
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.67
  • 40.126.32.76
  • 20.190.160.22
  • 20.190.160.64
  • 40.126.32.138
  • 40.126.32.74
  • 20.190.160.5
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info